Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

To: Hostage; Elderberry; LucyT

Thanks for your insight and thanks Elderberry for posting.
Although at the moment it doesn’t look as if “Hillary is going to win” we know they are capable of pulling stunts that will enable it.

LucyT ping to #3
http://www.freerepublic.com/focus/f-bloggers/3395091/posts?page=3#3


5 posted on 02/10/2016 7:24:28 AM PST by Whenifhow
[ Post Reply | Private Reply | To 3 | View Replies ]


To: Whenifhow; Elderberry; LucyT

There are three other vulnerabilities that are on the radar for enemies (or their mercenary surrogates) of the United States to exploit or implement:

1. Diebold Voting Machines
2. Microsoft Cloud Vote Tabulation Storage
3. Parolees working offsite mail rooms for absentee ballots

These vulnerabilities may seem far-fetched until one considers their deployment in a few chosen critical swing districts. For example, a few thousand votes in a handful of voting precincts in Ohio could flip that state to the Hillary column.

The third vulnerability listed above has actually occurred. Parolees are often under the close supervision of Parole Officers who are often persuaded to ‘lend’ their parolees to events involving community service. Community Service Officers are in many districts Obama people or hard-core ACORN type leftists. The mail rooms for receiving absentee ballots are thus vulnerable to stuffing or flagging before protective canvas procedures are executed. I have personally witnessed two elections stolen where absentee ballots tipped the election in the last hours of days following the election day. In both cases, it was documented that parolees were assigned to off-site mail rooms to bag and tag incoming absentee ballots.


6 posted on 02/10/2016 7:49:08 AM PST by Hostage (ARTICLE V)
[ Post Reply | Private Reply | To 5 | View Replies ]

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson